DroidBot Disaster: Android Trojan Targets 77 Banks with Sneaky Malware-as-a-Service Model
DroidBot is not your average Android remote access trojan. With a monthly fee of $3,000, this malware is like the Netflix of cybercrime, offering users access to a web panel for customizing attacks. Operating in Europe, it creatively uses MQTT and HTTPS for command-and-control, making it both flexible and resilient.

Hot Take:
Looks like Android users are in for a RAT-race with DroidBot, the malware that’s turned your phone into a double agent. Who knew that even malware was getting into the subscription service game? Move over Netflix, there’s a new player in town!
Key Points:
- DroidBot is a newly discovered Android remote access trojan (RAT) targeting banking institutions, cryptocurrency exchanges, and national organizations.
- It combines hidden VNC, overlay attack techniques, keylogging, and user interface monitoring.
- Operates on a malware-as-a-service (MaaS) model for $3,000 per month.
- Primarily seen in European countries, disguising itself as security apps or banking apps.
- Utilizes MQTT for outbound data and HTTPS for inbound commands.
Already a member? Log in here